>

Sec Engineering and Risk Analysis

Risk matrix

reacteur anime A

 

 

Display:
Sort By:
 Workbooks_ALL_Release One

All IoTSI Workbooks and instructional material. Free Download.

Login Required to view and/or download document. 

IoT OP Model

IoT Operational Model. This model provides a clear view of the 10 layer stack of an IoT Solution. This view can be beneficail in obtaining a high level view of the IoT Solution's key design decisions. It is possible to utilise the IoT Asset Register document to obtain a detailed view of solution components and possible risk exposure. 

Login Required to view and/or download document. 

Op Workflows

Operation Workflows Sheet:

A workflow consists of an orchestrated and repeatable pattern of business activity enabled by the systematic organization
of resources into processes that transform materials, provide services, or process information.
It can be depicted as a sequence of operations, the work of a person or group,[2] the work of an organization
of staff, or one or more simple or complex mechanisms. (Wikipedia)

Login Required to view and/or download document. 

Top-Level Network Model

Top-Level Network Model

Login Required to view and/or download document. 

Scenario-Based Risk Analysis

The IoTSI -SERA Framework incorporates two key design features that differentiate it from other security risk assessments. The first is the use of operational models. Participants applying traditional security-risk assessments typically rely on their tacit understanding of the operational context in which a software-reliant system must operate. Our experience indicates that tacit assumptions are often incorrect or incomplete, which adversely affects the results of a security risk analysis. We propose using operational models to describe a system’s operational context.

Login Required to view and/or download document. 

Use Case

In software and systems engineering, a use case is a list of actions or event steps typically defining the
interactions between a role (known in the Unified Modeling Language (UML) as an actor) and a system to achieve a goal.
The actor can be a human or other external system. In systems engineering, use cases are used at a higher level
than within software engineering, often representing missions or stakeholder goals.

Risk Assessment Workbook

Risk Assessment Workbook

Data Models

Data Models

Login Required to view and/or download document. 

Residual Risk

Residual Risk Worksheet

IoT Device Checklist

IoT Device Checklist. Critical to the deploment of an IoT system is the assessment of IoT devices. These devices require strigent assessment to ensure they meet baseline security requirements.

Control Plan

Control Plan

Login Required to view and/or download document. Non login users will only see the Details tab

IoTSI Asset Register contains all IoT Solutions Assets. It is possible to utilise this document with the IoT OP model to better undestand solution components and risk exposure.